Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Cloud Security Requires All Hands on Deck

Published: 04/12/2012

Andrew Wild, CSO at Qualys, discusses how security postures and attitudes need to change as more and more IT functionality moves to the cloud   It’s clear there are many compelling reasons, both financial and productivity-related, for enterprises to move IT functionality into the cloud, so it’...

Kudos to Microsoft! 3 Offerings Now on the STAR Registry

Published: 04/11/2012

We at the CSA want to offer a hearty congratulations to the team at Microsoft, for their leadership in completing and publishing STAR assessments for their products. As of today, Office 365, Windows Azure and Dynamics all have STAR assessments completed and published. We applaud Microsoft for le...

Cloud Fundamentals Video Series: Bring Your Own Device and the Cloud

Published: 03/28/2012

Another great video out on the Trustworthy Computing site... This latest video features Tim Rains, director, Trustworthy Computing, speaking with Jim Reavis of the CSA about the consumerization of IT and the issues that can be encountered when employees place an organization’s data on their pers...

Secure Cloud – Myth or Reality?

Published: 03/19/2012

Cloud Security is not a myth.  It can be achieved.  The biggest hindrance on debunking this myth is for enterprise businesses to begin thinking about the Cloud differently.  It is not the equipment of co-location dedicated servers, or on-premises technology, as it is changeable, flexible and tran...

Seeing Through the Clouds: Gaining confidence when physical access to your data is removed

Published: 03/12/2012

Cloud computing brings with it new opportunities, new frontiers, new challenges, and new chances for loss of intellectual property.  From hosting simple web sites, to entire development environments, companies have been experimenting with cloud-based services for some time.  Whether a company dec...

Lock Box: Where Should You Store Cloud Encryption Keys

Published: 03/12/2012

Whether driven by regulatory compliance or corporate mandates, sensitive data in the cloud needs protection along with access control. This usually involves encrypting data in transit as well as data at rest in some way, shape or form, and then managing the encryption keys to access the data. The...

Deprovisioning in the Cloud

Published: 02/23/2012

Let's be honest: how many of you have tried logging in to one of your former employer’s accounts?  Maybe you had a CRM solution and you wanted to get the name of that guy who suggested he had the next hot idea.  You didn't set your out-of-office message with your new/personal contact information ...

Opportunity Knocks Once…

Published: 02/10/2012

In 1983, I was a young electrical engineering student, when I took a job working for a small long distance company in Phoenix Arizona.  For me, Opportunity had Knocked and I had just opened the door on an amazing future.  In the world of communications, things were already changing and were about...

Cloud Fundamentals Video Series: The Benefits of Industry Collaboration to Cloud Computing Security

Published: 01/19/2012

SUBJECT: Cloud Fundamentals - Video from CSA Congress with Jim Reavis, Executive Director of the CSA, and Tim Rains, Microsoft's Director of Trustworthy Computing At the CSA Congress in November, Tim Rains, Director of Trustworthy Computing for Microsoft, sat down with Jim Reavis, our execu...

“On your mark … Get set … CLOUD!” (Part 2)

Published: 01/06/2012

A Commentary and Essay by Ron Knode My last post introduced the notion that preparation for enterprise cloud processing is comparable to the commands, “On your mark” and “Get set,” that precede the beginning of a race. Until the “GO,” there’s no progress toward the finish line – the payoff. I ou...

“On your mark … Get set … CLOUD!” (Part 1)

Published: 01/06/2012

A Commentary and Essay by Ron Knode Have you ever been in a race? I ran a lot of races during my competitive track and field career at the U.S. Naval Academy and during the dozen years thereafter. Every one of them started with the commands “On your mark … Get set … GO!” Usually a starter’s pist...

Cloud Security: An Oxymoron?

Published: 11/29/2011

Written by Torsten George, Vice President of Worldwide Marketing at Agiliance   Cloud computing represents today's big innovation trend in the information technology (IT) space. Because it allows organizations to deploy quickly, move swiftly, and share resources, cloud computing is rapidly re...

Cloud Security Considerations

Published: 11/14/2011

Can a cloud be as secure as a traditional network?  In a word, yes!  I agree that some may find this statement surprising.  Depending on the network, that may be a low bar, but good security principles and approaches are just as applicable to cloud environments as they are to traditional network ...

Leveraging Managed Cloud Services to Meet Cloud Compliance Challenges

Published: 11/04/2011

By Allen Allison   Regardless of your industry, customer base, or product, it is highly likely that you face regulatory compliance requirements.  If you handle Protected Health Information (PHI), the Health Insurance Portability and Accountability Act (HIPAA) – along with the HITECH enhancement...

Cloud Security: Confident, Fearful, or Surprised

Published: 11/04/2011

By Ken Biery   This two-part guest blog series explores the topic of cloud security.  Part one of the series focuses on the questions enterprise IT decision makers should ask when considering moving business applications to a cloud-based computing environment.     There is no shortage of inf...

Test Accounts: Another Compliance Risk

Published: 10/07/2011

By: Merritt Maximi A major benefit associated with deploying identity management and/or identity governance into an organization is that these solutions provide the ability to detect and remove orphan accounts.  Orphan accounts refer to active accounts belonging to a user who is no longer involv...

When It Comes To Cloud Security, Don’t Forget SSL

Published: 09/30/2011

By Michael Lin, Symantec   Cloud computing appears here to stay, bringing with it new challenges and security risks on one hand, while on the other hand boasting efficiencies, cost savings and competitive advantage. With the new security risks of cloud and the mounting skill and cunning of toda...

Securing Your File Transfer in the Cloud

Published: 09/30/2011

By Stuart Lisk, Sr. Product Manager, Hubspan Inc.  File transfer has been around since the beginning of time. Ok, well maybe that is an exaggeration, but the point is, file transfer was one of the earliest uses of “network” computing dating back to the early 1970’s when IBM introduced the floppy ...

CSA Blog: The “Don’t Trust Model”

Published: 09/14/2011

By Ed King The elephant in the room when it comes to barriers to the growth and adoption of Cloud computing by enterprises is the lack of trust held for  Cloud service providers.  Enterprise IT has legitimate concerns over the security, integrity, and reliability of Cloud based services.  The ...

Seven Steps to Securing File Transfer’s Journey to the Cloud

Published: 09/12/2011

By Oded Valin, Product Line Manager, Cyber-Ark Software   “When it absolutely, positively has to be there overnight.”  There’s a lot we can identify with when it comes to reciting FedEx’s famous slogan, especially as it relates to modern file transfer processes. When you think about sharing hea...

Browse by Topic